Cs54100 Database Systems | Database Assessment Answers
You are required to conduct research on how you will implement the web database, described in Assignment 1 (Modelling) business case,in a cloud instance.
Your research should be based on recent developments in the field of database technology.
Your response should address not only the implementation considerations but also the security issues.
Answer:
Recent developments that should be implemented on the given case study
For implementing the database for the football team is stated below.
- The database should support model of tunable consistency that allows strict RDBMS style which includes transactions, and dynamo style consistency.
- The data base should provide and extensible support which follows relational schema that allows data to be as a relational model. This also helps to allow the schema of extensible schema that possibly support embedded JSON data.
- The web database should also support different languages and the APIs (Dehdouh et al., 2015). The SQL appears mainly to remain primary access language and should also supplement graph languages which needs cypher, queries based on documented style and also ability for expressing the processing of MapReduce or all other DAG algorithms.
- The database should maintain an underlying model of data storage which allows physical storage of the data.
Implementing a DBMS
For implementing the database management system for the football team, there should be involvement of SQL interface that produces r modifies the data with the request of the response (Okoro, Adams & Fitch, 2015). This needs a multilevel processing of the system.
For implementing a data base system, all the users in the system should have a correct login names and valid passwords. In oracle platform, in the connection phase, the name of the database should be provided. This helps to allow one of the Oracle DBMS to run in many database that effectively are isolated from each other.
After the user has completed providing the username and the password, then the MySQL places user in specific table space in database (Hegazi, 2015). The name for the table space should be independent and the table space and the username should be synonymous. There should be different username provided for different databases that mainly serves different purpose.
After the table space is made, there are many number of tables that are visible. There are also columns in each table that are visible. In both approaches, tables from different table space are also accessed (Calvanese et al., 2015). The concept of MYSQL mainly depends on table space and the database being as the same concept but for Oracle, there are two different ideas that are different form each other. But, the overall syntax remains the same.
Common security issues that are related to Database
The common security issue that are faced by implementing the system in the database. The security issues are stated below.
1. No Testing of the Application before Deployment
The most important causes of the database issues is the negligence involved in the deployment stage in the development process. The functional testing for the application is generally conducted for ensuring the supreme performance of the application. This test usually do not show the database is doing some work or not. It is very important to test the security of the website with different types of testing methods before deploying the application.
2. Poor Encryption as well Data Breaches that come together
The backend of the database should be set up and should focus more on elimination of the threats that are related to Internet borne (Sul et al., 2017). There are many network interfaces that are involved in the databases which the hackers tracks for poor security of the database (Mason, 2017). It is important to implement TLS as well as SSL encrypted platforms for communication in the database platform.
3. Stolen Backups of Database
There are mainly two types of database threats that includes external threat and internal threat. There are many cases where the companies mainly struggle with the internal threats rather than the external threats (Coronel, C., & Morris, 2016). There are many ways to eliminate risks which includes encryption of the database service, implementation of the security standards, apply fines in violation case and using of cybersecurity software.
5. Flaws in Database Security Issue
The databases of the system is hacked with the flaws that are included in the features. Hackers mainly breaks the legitimate credentials and the compel system for running the arbitrary code. The database is usually protected from the third party access for the purpose of security testing.
7. Low Data Protection
The data that are involved in the database system should have high security (Dhote 2016). The users who are involved in the database process that experience more difficulties which steal any type of data. The data involved in the system for football coach usually will have sensitive data and the data should be protected.
References
Calvanese, D., Montali, M., Patrizi, F., & Rivkin, A. (2015). Implementing data-centric dynamic systems over a relational DBMS. In Alberto Mendelzon International Workshop on Foundations of Data Management (p. 209).
Hegazi, M. O. A. (2015). An Approach for Designing and Implementing Eager and lazy Data Replication. International Journal of Computer Applications, 110(6).
Coronel, C., & Morris, S. (2016). Database systems: design, implementation, & management. Cengage Learning.
Mason, R. O. (2017). Four ethical issues of the information age. In Computer Ethics (pp. 41-48). Routledge.
Dhote, C. A. (2016). Homomorphic encryption for security of cloud data. Procedia Computer Science, 79, 175-181.
Dehdouh, K., Bentayeb, F., Boussaid, O., & Kabachi, N. (2015, January). Using the column oriented NoSQL model for implementing big data warehouses. In Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA) (p. 469). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
Okoro, H. C., Adams, C., & Fitch, T. (2015, June). Insights, Issues and Challenges of Applying DBMS in Hospitals Within Developing Countries. In European Conference on e-Government (p. 465). Academic Conferences International Limited.
Sul, W., Yeom, H. Y., Cho, K., & Jung, H. (2017, September). Analysis of Service-Oriented DBMS Organization. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on (pp. 251-256). IEEE.
Buy Cs54100 Database Systems | Database Assessment Answers Online
Talk to our expert to get the help with Cs54100 Database Systems | Database Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.